US20170104870A1 - A method to authenticate calls in a telecommunication system - Google Patents

A method to authenticate calls in a telecommunication system Download PDF

Info

Publication number
US20170104870A1
US20170104870A1 US15/312,337 US201515312337A US2017104870A1 US 20170104870 A1 US20170104870 A1 US 20170104870A1 US 201515312337 A US201515312337 A US 201515312337A US 2017104870 A1 US2017104870 A1 US 2017104870A1
Authority
US
United States
Prior art keywords
call
request
calling party
party
token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/312,337
Inventor
Subash MANDANAPU
Manoj Mourya
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
Orange SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orange SA filed Critical Orange SA
Priority to US15/312,337 priority Critical patent/US20170104870A1/en
Publication of US20170104870A1 publication Critical patent/US20170104870A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6027Fraud preventions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6045Identity confirmation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Definitions

  • the present invention generally relates to communications using electronic devices in telecommunication networks, and more specifically to enhanced communications services.
  • a phone or device is generally a subscriber to a telecommunication network in order to enjoy communication services, such as voice, data, . . . for mobile phones, or handover between landline and mobile phones.
  • a subscriber to a telecommunication network is generally identified through its identifier in the network, like his phone number.
  • the identifier When presented during a call placed from a calling device, the identifier is referred as the Caller Identifier or Caller ID in short.
  • MSISDN Mobile Station International Subscriber Directory Number
  • a mobile device generally comes with a Subscriber Identity Module (SIM), unique to one subscriber and carries information to identify that subscriber in his home network, i.e. the network he is a subscriber of. This information includes the International mobile Subscriber Identity (IMSI) and other authentication data.
  • SIM Subscriber Identity Module
  • IMSI International mobile Subscriber Identity
  • GSM Global System for Mobile communications
  • UMTS Universal Mobile Telecommunications System
  • Landline devices such as home devices or work devices, are also associated to a phone number to be presented as the Caller ID.
  • the Caller ID of the calling device is generally used by the called device to look up in a directory or contact list to present an enhanced Caller ID comprises a name, and even a picture or live data, when the Caller ID is associated to a live stream for the contact.
  • the Caller ID can nonetheless be deceiving.
  • Telco related consumer fraud is growing across different markets, where the fraudsters/impostors pretend to be a business or a service provider, like a financial institution, and call customers using a fake Caller ID to gather personal information.
  • imposters can easily modify their Caller ID to known institutions such as Financial or Health Care provider to deceive the customer.
  • Google devices offer a Caller ID search by searching the web based on the Caller ID from an incoming call, and displaying the name of the found business with the Caller ID on the called device. As the caller ID may already be compromised even prior to the Google search, this service will contribute to deceiving the user as displaying wrong information and lead the customer to believe that this call is from trusted party.
  • the present system proposes a method to verify a calling party when placing a call to a recipient party, the method comprising:
  • API Application Program Interface
  • a method is provided to allow calls from pre-registered calling parties. Only parties with a registration token may be allowed to place certified calls to recipient parties. Thus the callee can enjoy a sense of security knowing that the entity the incoming call originates from is a verified entity.
  • the present system also proposed a call verification server to verify a calling party when placing a call to a recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
  • API Application Program Interface
  • a telecommunication system in accordance with the present system may include
  • the call verification server comprising an Application Program Interface (API) platform and being configured to:
  • API Application Program Interface
  • An application embodied on a computer readable medium in accordance with the present system may be configured to verify a calling party when placing a call to a recipient party, the application comprising instructions for:
  • API Application Program Interface
  • FIG. 1A shows an first illustrative embodiment of the present system
  • FIG. 1B shows a second illustrative embodiment of the present system
  • FIG. 2A is a flowchart illustrating an embodiment of the present method, and
  • FIG. 2B shows further acts of the flow chart of FIG. 2A .
  • routers, servers, nodes, base stations, gateways or other entities in a telecommunication network are not detailed as their implementation is beyond the scope of the present system and method.
  • a “call” in this description may be a standard voice call or any other communication session established between a first party, referred to as the calling party or caller, and a second party, referred to as the called party or callee.
  • the call is placed more precisely between the users telecommunication devices, i.e. the calling device and the called or recipient device, for instance a video call between the first and second parties, or data exchange between devices.
  • Each side of the call in the telecommunication network will be referred to a branch or a leg of the call.
  • the call may also be referred to as a communication path between the two devices. When a communication path is set up between both calling and called devices, different entities of the present telecommunication system are involved and this path generally involves a two level exchange mechanism:
  • a signaling level corresponding to the signaling (or set up) messages exchanges through the network entities between the two devices
  • a media level for handling data voice (when Voice over IP) . . .
  • the calling and called devices will also be referred to as end points as they represent both ends to the communication path.
  • FIG. 1A shows a first exemplary embodiment of the present system.
  • a first device 101 for User A is associated to a first Caller ID Caller_ID_A.
  • Caller_ID_A In existing system, when placing or making a call to a second device 102 , associated to the User B, Caller_ID_A will be presented to that second device 102 . As mentioned before, imposters may use a fake Caller_ID_A to present to the second device 102 .
  • the first device 101 may comprise a client or application CLIENT_ 1 (not shown in the present FIG. 1A ) to send a request to a call verification server 100 (CVS) for registration to a call—or calling party—verification service.
  • CVS call verification server 100
  • the present CVS 100 may comprise:
  • API Application Program Interface
  • CCM Call Control Module
  • Call control that corresponds to the central function of a telephone switch.
  • Call control offers different features such as decoding addressing information and routing telephone calls from one end point to another. It also creates added features such as “Call Waiting”, “Call Forward on Busy”, and “Do Not Disturb”. This function handles the signaling level mentioned before in regards to the communication between the two devices,
  • a Media function to handle the entire media part of a communication between two end points. This function corresponds to the over level, i.e. the media level mentioned before.
  • CVS 100 may store in database 115 an entry for the calling party, and allocate a first registration token that is associated at the API platform with an entry for the calling party. The storage of the registration token allows the subsequent identification of the calling party, whenever calling an API using that first token.
  • the first token is sent to the calling party and stored thereon, when received, by the agent CLIENT_ 1 .
  • the calling party may proceed with a call using the call verification service of the present system. Rather than calling directly the called party 102 , the calling party will make a second request, using the client CLIENT_ 1 , to the API platform 110 , to set up a call.
  • the second request will comprise:
  • data for the called party recipient to the call may be for instance its phone number,
  • the server 100 From the CVS side, the server 100 will receive at the API platform 110 a request from the calling party to set up a call, the request comprising data for a recipient party for the call, and a second token.
  • the CVS will look up in database 115 the registration token associated to the calling party and compare it to the received token in the call set up request. Provided there is a match between the received second token and the first registration token stored for the calling party, the CVS 100 will proceed with setting up, i.e. connecting, a call between the calling party and the recipient/called party using the CCM 120 .
  • FIG. 1B is an alternative embodiment of the present system.
  • the CVS 100 , its database 115 , its CCM 120 and the API platform 110 are similar to the corresponding references in FIG. 1A .
  • a plurality of calling devices 101 Ai illustrated as devices 101 A 1 , associated to user A 1 , and 101 A 2 , associated to user A 2 , are hosted behind a PBX (Private Branch eXchange) 150 of e.g. a company.
  • Each calling device 101 Ai may be associated to a caller ID Caller_ID_Ai with the PBX.
  • the request for registration to the call verification service may be handled at the PBX level, the first registration token being associated to the company, i.e. an identifier for the PBX.
  • the PBX identifier may be added to the call set up messages so that the API platform identifies the PBX 150 and retrieve the right registration token associated in database 115 to the company.
  • the PBX may be configured to call the different APIs offered by the API platform 110 from the CVS 100 .
  • the PBX illustration is a mere example of a different embodiment of the present call verification service as it may be replaced by a carrier network bridging another network where the CVS 100 is hosted.
  • One may note that illustrating the CVS 100 as comprising two parts is in no way limiting as these two parts could be hosted by the same node or server, or being operatively linked to each other.
  • the two part presentation helps to illustrate the different tasks and functions performed by the CVS 100 in the present system.
  • FIG. 2A is a flow chart illustrating an exemplary embodiment of the present method, wherein the first device 101 of FIG. 1A places a call to the second device 102 using the present call verification service.
  • the present acts are carried out by the CVS 100 , more precisely a processor running an application comprising instructions to execute the present computer implemented method.
  • the calling device 101 may download an application like CLIENT_ 1 for enabling the present call verification service.
  • the application may be available through a platform operatively connected to the CVS 100 the user A may register with using for instance a login and password.
  • the user may obtain the application CLIENT_ 1 from an application store the calling device may operate with.
  • the service When available through a PBX of a company, the service may be enabled at the PBX level through a software or application running on the company's network.
  • a calling device 101 like a mobile phone.
  • the present teachings may be applied by the man skilled in the art to electronic devices behind a PBX or a carrier network like in the illustration of FIG. 2B or a landline device connected to a set top box or the PSTN (Public Switch Network).
  • PSTN Public Switch Network
  • the CVS 100 will receive at the API platform 110 a request from the calling party 101 for registration to the calling party—or call—verification service of the present system. This corresponds to the setup message “setup 1 ” in FIGS. 1A and 1B .
  • the request for registration further comprises a first identifier for the calling party.
  • This may be for instance the Caller ID Caller_ID_A for the calling device 101 or another identifier, like a User A login for the call verification service of the present system.
  • the PBX embodiment it may be a login or registration ID for the company.
  • the identifier may be stored at the CVS 100 , e.g. in database 1151 and used as seen here after either to increase security of the service, generate the registration token or an enhanced Caller ID.
  • the CVS 100 may verify whether calling party 101 is an imposter or not.
  • Different techniques like the certification proposed in document US20110085650A1, may be used at this stage and are beyond the scope of the present system.
  • the registration may include a premium registration wherein the calling party has to go through a detailed registration, including e.g. payment, so as to further verify the calling party.
  • the call verification service may carry on to act 230 .
  • the service will proceed with act 255 , i.e. reject the request for registration.
  • the request for registration in act 210 may be followed directly by the act 230 .
  • the CVS 100 will send to the calling party 101 , as a response to the request for registration, a first token associated at the API platform 110 to the calling party. This corresponds to the setup message “setup 2 ” in FIGS. 1A and 1B .
  • the association may be carried out by storing at the API platform the calling party first identifier in relation to the first token, for instance in database 115 .
  • the act 230 may further comprise an act (not shown in FIG. 2A ) wherein the CVS 100 generates the registration token based on the first identifier.
  • a hashing technique may be used for instance so as to make sure the token is unique to the calling party.
  • the CVS 100 may be operated by a telecommunication operator, or TelCo, which acts as a call verification entity.
  • TelCo may uses latest available technology to verify the calling party (e.g. using private public keys, shared keys, unique keys, one-time use keys, etc..) to generate the registration token.
  • These security parameters may be preconfigured based on the relationship or business model between Telco and businesses.
  • the calling party will store the registration token for further use when calling an API from the API platform 110 of CVS 100 .
  • the calling party may enable its callee to verify the calling party origin. To do so, whenever placing a call to a called or recipient party 102 , the calling party will request to set up a call using a call request API from the API platform 110 . This corresponds to the setup message “setup 3 ” in FIGS. 1A and 1B .
  • the request may comprise data for the calling party, and the first token to be identified by the CVS 100 .
  • the request to set up a call may further comprise the calling party identifier as stored at the API platform 150 .
  • the CVS will receive a request for setting up a call to the recipient party, the request comprising a recipient or called party for the call, and a second token. This corresponds to the first leg of the call between the calling and the called parties.
  • the CVS 100 will then proceed with verifying if the received second token corresponds to a registration token as stored at the API platform, i.e. if the calling party registered with the CVS 100 prior to requesting a call.
  • the match may comprise searching through allocated registration tokens the one matching the received second token.
  • the CVS 100 will retrieve the registration token stored in database 115 at the entry corresponding to the calling party identifier. More complex matching or verification scenarios may be envisaged to increase security of the registration and verification process.
  • the request will be rejected in further act 255 .
  • the CVS 100 will proceed with setting up a call between the calling party 101 and the called party 102 in a further act 270 using the CCM 120 . This corresponds to the setup message “setup 4 ” in FIGS. 1A and 1B and the second leg of the call.
  • the matching tokens ensure that the calling party was first registered with the CVS 100 , server that will subsequently set the call to the recipient party 102 upon recognition of a previously allocated registration token.
  • a verified call is established between the calling party and the called party, by joining e.g. the two legs of the call.
  • the call set up of act 270 may further comprise the presentation of a first notification to the called device. This corresponds to the setup message “setup 5 ” in FIGS. 1A and 1B .
  • the first notification simply may be the Caller ID of the calling device, or an enhanced Caller ID to show the callee that the incoming call is certified.
  • the first notification presented to the called device comprises an indication that the call is verified.
  • the CVS 100 will generate a Caller ID for the incoming call using the calling party identifier.
  • the calling party identifier may come from the identifier stored with the calling party registration token or a second identifier comprised in the call set up request received in act 240 .
  • the generated Caller ID may be referred to as an enhanced Caller ID and may comprise one or more of:
  • the first notification or enhanced Caller ID may be pushed through the CCM 120 so as to be presented to the callee. Such an enhanced Caller ID may actually be based on the result of the match between the registration token, and the token received in the call set up request.
  • the first notification may be presented to the user using different paths, for instance through a short message, or through a voice notification. Different notifications may be used to present the indication that the incoming call is verified.
  • the call set up of act 270 may not be only conditioned to a match between the allocated registration token and the received token. Indeed, in a further embodiment of the present system, the call set up may be further conditioned to a match between the stored identifier for the calling party (as known from the registration of act 210 ) and a second identifier in the call set up request received at the API platform 150 .
  • the call set up may be conditioned to further verification as follows.
  • the call set up may indeed offer the possibility to the callee to place a request for further verification.
  • the first notification displayed on the called device, with the indication that the call is verified may indeed comprise an active element the callee may select to send a request for further verifications.
  • the notification is received e.g. through a text
  • the user B may reply to the text to request further verification.
  • the CVS 100 will receive in reply to the first notification, a request for further verification from the recipient party 102 . This corresponds to the setup message “setup 6 ” in FIGS. 1A and 1B .
  • data related to the recipient party will be retrieved at the API platform.
  • the CVS will check if the recipient party is a first time user to the call verification service.
  • the CVS 100 will request a challenge from the recipient party in a further act 280 .
  • the challenge will correspond to a user defined test uniquely known to the user, thereby showing that the call is actually a verified call under the present call verification service.
  • the challenge may be for instance a voice prompt that the user B of the recipient device may record for subsequent replay with each incoming verified call.
  • Such a challenge will be stored in a further act 282 in relation to the recipient party in database 115 , using for instance its phone number at the entry in the database.
  • the service may carry on with presenting further information about the calling party in an act 282 , such as full name, website info, or any other data collected during registration of acts 210 - 230 in FIG. 2A .
  • the CVS 100 will retrieve in database 115 the data stored in relation to the recipient party entry in a further act 290 , e.g. the challenge provided in act 280 .
  • the challenge such as a voice prompt with the User B own voice, will be presented to the recipient device. This may alternatively be further questions, or recognition of objects initially provided by the user B.
  • the CVS will present a second notification based on the retrieved data, here the stored challenge. This corresponds to the setup message “setup 7 ” in FIGS. 1A and 1B .
  • the present call verification service will proceed to act 284 with providing additional information about the calling party.
  • a call i.e. a communication path, is established between the calling party and the recipient party.
  • a user can enjoy a call verification service allowing only certified/verified calls from calling parties such as businesses.
  • the CVS 100 Using a token provided at registration of a calling party, the CVS 100 will only process calls from registered parties.
  • the present system also bring enhanced trust to the callee as to whom is behind the incoming call.

Abstract

The present system discloses a method to verify a calling party when placing a call to a recipient party, the method comprising receiving at an Application Program Interface (API) platform a request from a calling party for registration for the calling party verification, sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party, receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token, and setting up a call to the recipient party, when there is a match between the first and second token.

Description

    FIELD OF THE PRESENT SYSTEM
  • The present invention generally relates to communications using electronic devices in telecommunication networks, and more specifically to enhanced communications services.
  • BACKGROUND OF THE PRESENT SYSTEM
  • Phones such as mobile and landline have become important devices in our daily life. A phone or device is generally a subscriber to a telecommunication network in order to enjoy communication services, such as voice, data, . . . for mobile phones, or handover between landline and mobile phones.
  • A subscriber to a telecommunication network is generally identified through its identifier in the network, like his phone number. When presented during a call placed from a calling device, the identifier is referred as the Caller Identifier or Caller ID in short.
  • For a mobile, his MSISDN (Mobile Station International Subscriber Directory Number) is actually the mobile device phone number. A mobile device generally comes with a Subscriber Identity Module (SIM), unique to one subscriber and carries information to identify that subscriber in his home network, i.e. the network he is a subscriber of. This information includes the International mobile Subscriber Identity (IMSI) and other authentication data. The mobile IMSI is a unique number associated with all GSM (Global System for Mobile communications) and Universal Mobile Telecommunications System (UMTS) network mobile phone users. The SIM and its IMSI may be associated to several MSISDN.
  • Landline devices, such as home devices or work devices, are also associated to a phone number to be presented as the Caller ID.
  • The Caller ID of the calling device is generally used by the called device to look up in a directory or contact list to present an enhanced Caller ID comprises a name, and even a picture or live data, when the Caller ID is associated to a live stream for the contact. The Caller ID can nonetheless be deceiving.
  • Indeed, Telco related consumer fraud is growing across different markets, where the fraudsters/impostors pretend to be a business or a service provider, like a financial institution, and call customers using a fake Caller ID to gather personal information. Today, imposters can easily modify their Caller ID to known institutions such as Financial or Health Care provider to deceive the customer.
  • Today there is no solution for customers to verify if the call is coming from a known or certified service provider. Most of the customers rely on the caller ID to filter or screen a call. Google devices offer a Caller ID search by searching the web based on the Caller ID from an incoming call, and displaying the name of the found business with the Caller ID on the called device. As the caller ID may already be compromised even prior to the Google search, this service will contribute to deceiving the user as displaying wrong information and lead the customer to believe that this call is from trusted party.
  • Another solution is proposed in document US20110085650A1 wherein the Caller ID is used to check with a certification server where the call originates from. Nevertheless, this is still a Caller ID based approach that can be worked around by mimicking a false Caller ID.
  • Today there is still a need for a simple solution that allows an efficient Caller ID screening and certification for a user when receiving a call. There is a further need for a system service providers can use easily to present a certified Caller ID to a callee/user.
  • SUMMARY OF THE PRESENT SYSTEM AND METHOD
  • It is an object of the present system, processor and method to overcome disadvantages and/or make improvements in the prior art.
  • To that extent, the present system proposes a method to verify a calling party when placing a call to a recipient party, the method comprising:
  • receiving at an Application Program Interface (API) platform a request from a calling party for registration for the calling party verification,
  • sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
  • receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
  • setting up a call to the recipient party, when there is a match between the first and second token.
  • Thanks to the present system, a method is provided to allow calls from pre-registered calling parties. Only parties with a registration token may be allowed to place certified calls to recipient parties. Thus the callee can enjoy a sense of security knowing that the entity the incoming call originates from is a verified entity.
  • The present system also proposed a call verification server to verify a calling party when placing a call to a recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
  • receive at the API platform a request from a calling party for registration for the calling party verification,
  • send to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
  • receive at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
  • set up a call to the recipient party, when there is a match between the first and second token.
  • A telecommunication system in accordance with the present system may include
  • a calling party
  • a recipient party
  • a call verification server to verify the calling party when placing a call to the recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
  • receive at the API platform a request from a calling party for registration for the calling party verification,
  • send to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
  • receive at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
  • set up a call to the recipient party, when there is a match between the first and second token.
  • An application embodied on a computer readable medium in accordance with the present system may be configured to verify a calling party when placing a call to a recipient party, the application comprising instructions for:
  • receiving at an Application Program Interface (API) platform a request from the calling party for registration for the calling party verification,
  • sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
  • receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
  • setting up a call to the recipient party, when there is a match between the first and second token.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present system, call management node and method are explained in further detail, and by way of example, with reference to the accompanying drawings wherein:
  • FIG. 1A shows an first illustrative embodiment of the present system,
  • FIG. 1B shows a second illustrative embodiment of the present system,
  • FIG. 2A is a flowchart illustrating an embodiment of the present method, and;
  • FIG. 2B shows further acts of the flow chart of FIG. 2A.
  • DETAILED DESCRIPTION OF THE PRESENT SYSTEM AND METHOD
  • The following are descriptions of exemplary embodiments that when taken in conjunction with the drawings will demonstrate the above noted features and advantages, and introduce further ones.
  • In the following description, for purposes of explanation rather than limitation, specific details are set forth such as architecture, interfaces, techniques, etc., for illustration. However, it will be apparent to those of ordinary skill in the art that other embodiments that depart from these details would still be understood to be within the scope of the appended claims.
  • Moreover, for the purpose of clarity, detailed descriptions of well-known devices, systems, and methods are omitted so as not to obscure the description of the present system. Furthermore, routers, servers, nodes, base stations, gateways or other entities in a telecommunication network are not detailed as their implementation is beyond the scope of the present system and method.
  • This illustration is in no way a limitation of the scope of the present method and system as communication devices such as fixed devices or communication devices behind a PBX (Private Branch eXchange), and more generally any device registered for communication services in an operator network can benefit from the present teachings.
  • Furthermore, what will be referred to as a “call” in this description may be a standard voice call or any other communication session established between a first party, referred to as the calling party or caller, and a second party, referred to as the called party or callee. One will understand of course that the call is placed more precisely between the users telecommunication devices, i.e. the calling device and the called or recipient device, for instance a video call between the first and second parties, or data exchange between devices. Each side of the call in the telecommunication network will be referred to a branch or a leg of the call. The call may also be referred to as a communication path between the two devices. When a communication path is set up between both calling and called devices, different entities of the present telecommunication system are involved and this path generally involves a two level exchange mechanism:
  • a signaling level corresponding to the signaling (or set up) messages exchanges through the network entities between the two devices,
  • a media level for handling data, voice (when Voice over IP) . . .
  • Furthermore, the calling and called devices will also be referred to as end points as they represent both ends to the communication path.
  • In addition, it should be expressly understood that the drawings are included for illustrative purposes and do not represent the scope of the present system.
  • FIG. 1A shows a first exemplary embodiment of the present system. A first device 101 for User A is associated to a first Caller ID Caller_ID_A. In existing system, when placing or making a call to a second device 102, associated to the User B, Caller_ID_A will be presented to that second device 102. As mentioned before, imposters may use a fake Caller_ID_A to present to the second device 102.
  • In this first exemplary embodiment of the present system, the first device 101 may comprise a client or application CLIENT_1 (not shown in the present FIG. 1A) to send a request to a call verification server 100 (CVS) for registration to a call—or calling party—verification service. To offer such a service, through the server 100, the present CVS 100 may comprise:
  • an API (Application Program Interface) platform 110 enabling the agent of first electronic device 101 to interact with the CVS 100 and the call verification service,
  • a CCM (Call Control Module) 120 to handle the communication path between the two devices 101 and 102. Such a module or node may be in charge of handling call setup messages for the present call verification service. This module is a known module in today telecommunication networks and may be characterized through 2 main functions:
  • a) a Call Control function that corresponds to the central function of a telephone switch. Call control offers different features such as decoding addressing information and routing telephone calls from one end point to another. It also creates added features such as “Call Waiting”, “Call Forward on Busy”, and “Do Not Disturb”. This function handles the signaling level mentioned before in regards to the communication between the two devices,
  • b) a Media function to handle the entire media part of a communication between two end points. This function corresponds to the over level, i.e. the media level mentioned before.
  • When receiving at the API platform 110 a request from the calling party 110 for registration to the calling party verification service, CVS 100 may store in database 115 an entry for the calling party, and allocate a first registration token that is associated at the API platform with an entry for the calling party. The storage of the registration token allows the subsequent identification of the calling party, whenever calling an API using that first token.
  • As a response to the request for registration, the first token is sent to the calling party and stored thereon, when received, by the agent CLIENT_1.
  • Once registered, the calling party may proceed with a call using the call verification service of the present system. Rather than calling directly the called party 102, the calling party will make a second request, using the client CLIENT_1, to the API platform 110, to set up a call. The second request will comprise:
  • data for the called party recipient to the call. Such data may be for instance its phone number,
  • the first registration token.
  • From the CVS side, the server 100 will receive at the API platform 110 a request from the calling party to set up a call, the request comprising data for a recipient party for the call, and a second token.
  • The CVS will look up in database 115 the registration token associated to the calling party and compare it to the received token in the call set up request. Provided there is a match between the received second token and the first registration token stored for the calling party, the CVS 100 will proceed with setting up, i.e. connecting, a call between the calling party and the recipient/called party using the CCM 120.
  • Other functionalities, such as an enhanced caller ID presentation may also be enabled through the present system as explained here after.
  • FIG. 1B is an alternative embodiment of the present system. The CVS 100, its database 115, its CCM 120 and the API platform 110 are similar to the corresponding references in FIG. 1A. A plurality of calling devices 101Ai, illustrated as devices 101A1, associated to user A1, and 101A2, associated to user A2, are hosted behind a PBX (Private Branch eXchange) 150 of e.g. a company. Each calling device 101Ai may be associated to a caller ID Caller_ID_Ai with the PBX. In the present system, the request for registration to the call verification service may be handled at the PBX level, the first registration token being associated to the company, i.e. an identifier for the PBX. When placing a call from one of the calling devices 101 Ai, the PBX identifier may be added to the call set up messages so that the API platform identifies the PBX 150 and retrieve the right registration token associated in database 115 to the company.
  • Such an embodiment using a PBX can enjoy the same services as the ones for an individual user of FIG. 1A and described here after. The PBX may be configured to call the different APIs offered by the API platform 110 from the CVS 100.
  • The PBX illustration is a mere example of a different embodiment of the present call verification service as it may be replaced by a carrier network bridging another network where the CVS 100 is hosted. One may note that illustrating the CVS 100 as comprising two parts is in no way limiting as these two parts could be hosted by the same node or server, or being operatively linked to each other. The two part presentation helps to illustrate the different tasks and functions performed by the CVS 100 in the present system.
  • FIG. 2A is a flow chart illustrating an exemplary embodiment of the present method, wherein the first device 101 of FIG. 1A places a call to the second device 102 using the present call verification service. The present acts are carried out by the CVS 100, more precisely a processor running an application comprising instructions to execute the present computer implemented method.
  • In a preliminary act not shown in FIG. 2A, the calling device 101 may download an application like CLIENT_1 for enabling the present call verification service. The application may be available through a platform operatively connected to the CVS 100 the user A may register with using for instance a login and password. Alternatively, the user may obtain the application CLIENT_1 from an application store the calling device may operate with.
  • When available through a PBX of a company, the service may be enabled at the PBX level through a software or application running on the company's network. In the hereafter description, reference will be made to a calling device 101, like a mobile phone. More generally, the present teachings may be applied by the man skilled in the art to electronic devices behind a PBX or a carrier network like in the illustration of FIG. 2B or a landline device connected to a set top box or the PSTN (Public Switch Network).
  • In an act 210, corresponding to the registration of the calling device 101 to the call verification service, the CVS 100 will receive at the API platform 110 a request from the calling party 101 for registration to the calling party—or call—verification service of the present system. This corresponds to the setup message “setup 1” in FIGS. 1A and 1B.
  • In an additional embodiment of the present system, the request for registration further comprises a first identifier for the calling party. This may be for instance the Caller ID Caller_ID_A for the calling device 101 or another identifier, like a User A login for the call verification service of the present system. For the PBX embodiment, it may be a login or registration ID for the company.
  • The identifier may be stored at the CVS 100, e.g. in database 1151 and used as seen here after either to increase security of the service, generate the registration token or an enhanced Caller ID.
  • In a further and optional act 220 (shown in dotted lines in FIG. 2A), the CVS 100 may verify whether calling party 101 is an imposter or not. Different techniques, like the certification proposed in document US20110085650A1, may be used at this stage and are beyond the scope of the present system. For instance the registration may include a premium registration wherein the calling party has to go through a detailed registration, including e.g. payment, so as to further verify the calling party.
  • Provided the authentication is granted (answer Yes to act 220), the call verification service may carry on to act 230. Provided the authentication is rejected (answer No to act 220), the service will proceed with act 255, i.e. reject the request for registration.
  • Alternatively, the request for registration in act 210 may be followed directly by the act 230. In a further act 230 of the present method, the CVS 100 will send to the calling party 101, as a response to the request for registration, a first token associated at the API platform 110 to the calling party. This corresponds to the setup message “setup 2” in FIGS. 1A and 1B. The association may be carried out by storing at the API platform the calling party first identifier in relation to the first token, for instance in database 115.
  • Different techniques may be used to generate the first token, it may be chosen randomly at the CVS level. Alternatively, in an additional embodiment of the present system, the act 230 may further comprise an act (not shown in FIG. 2A) wherein the CVS 100 generates the registration token based on the first identifier. A hashing technique may be used for instance so as to make sure the token is unique to the calling party.
  • More generally, in the present system, the CVS 100 may be operated by a telecommunication operator, or TelCo, which acts as a call verification entity. A TelCo may uses latest available technology to verify the calling party (e.g. using private public keys, shared keys, unique keys, one-time use keys, etc..) to generate the registration token. These security parameters may be preconfigured based on the relationship or business model between Telco and businesses.
  • In a further act (not shown in FIG. 2A), the calling party will store the registration token for further use when calling an API from the API platform 110 of CVS 100. Thanks to the present call verification service, the calling party may enable its callee to verify the calling party origin. To do so, whenever placing a call to a called or recipient party 102, the calling party will request to set up a call using a call request API from the API platform 110. This corresponds to the setup message “setup 3” in FIGS. 1A and 1B. The request may comprise data for the calling party, and the first token to be identified by the CVS 100. Optionally the request to set up a call may further comprise the calling party identifier as stored at the API platform 150.
  • Consequently, in a further act 240, the CVS will receive a request for setting up a call to the recipient party, the request comprising a recipient or called party for the call, and a second token. This corresponds to the first leg of the call between the calling and the called parties. The CVS 100 will then proceed with verifying if the received second token corresponds to a registration token as stored at the API platform, i.e. if the calling party registered with the CVS 100 prior to requesting a call. The match may comprise searching through allocated registration tokens the one matching the received second token. Alternatively, when the identifier for the calling party is provided in the call set up request, the CVS 100 will retrieve the registration token stored in database 115 at the entry corresponding to the calling party identifier. More complex matching or verification scenarios may be envisaged to increase security of the registration and verification process.
  • Provided there is no match between the received token from the call setup request and the token stored for the calling party (answer No to act 250), the request will be rejected in further act 255. Provided there is a match (answer Yes to act 250), the CVS 100 will proceed with setting up a call between the calling party 101 and the called party 102 in a further act 270 using the CCM 120. This corresponds to the setup message “setup 4” in FIGS. 1A and 1B and the second leg of the call. The matching tokens ensure that the calling party was first registered with the CVS 100, server that will subsequently set the call to the recipient party 102 upon recognition of a previously allocated registration token.
  • Thus, a verified call is established between the calling party and the called party, by joining e.g. the two legs of the call.
  • The call set up of act 270 may further comprise the presentation of a first notification to the called device. This corresponds to the setup message “setup 5” in FIGS. 1A and 1B. The first notification simply may be the Caller ID of the calling device, or an enhanced Caller ID to show the callee that the incoming call is certified. In an additional embodiment of the present system, the first notification presented to the called device comprises an indication that the call is verified.
  • To do so, in a further optional act 260 in dotted lines in FIG. 2A, the CVS 100 will generate a Caller ID for the incoming call using the calling party identifier. The calling party identifier may come from the identifier stored with the calling party registration token or a second identifier comprised in the call set up request received in act 240. The generated Caller ID may be referred to as an enhanced Caller ID and may comprise one or more of:
  • an indication of the calling party identifier,
  • an indication that the call is verified, e.g. “Orange certified call” added in the notification to the call. The first notification or enhanced Caller ID may be pushed through the CCM 120 so as to be presented to the callee. Such an enhanced Caller ID may actually be based on the result of the match between the registration token, and the token received in the call set up request.
  • The first notification may be presented to the user using different paths, for instance through a short message, or through a voice notification. Different notifications may be used to present the indication that the incoming call is verified.
  • The call set up of act 270 may not be only conditioned to a match between the allocated registration token and the received token. Indeed, in a further embodiment of the present system, the call set up may be further conditioned to a match between the stored identifier for the calling party (as known from the registration of act 210) and a second identifier in the call set up request received at the API platform 150.
  • The call set up may be conditioned to further verification as follows. The call set up may indeed offer the possibility to the callee to place a request for further verification. The first notification displayed on the called device, with the indication that the call is verified, may indeed comprise an active element the callee may select to send a request for further verifications. Alternatively, when the notification is received e.g. through a text, the user B may reply to the text to request further verification.
  • In a further act 275, the CVS 100 will receive in reply to the first notification, a request for further verification from the recipient party 102. This corresponds to the setup message “setup 6” in FIGS. 1A and 1B. In a subsequent act, data related to the recipient party will be retrieved at the API platform.
  • To do so, in an act 277 shown in FIG. 2B, the CVS will check if the recipient party is a first time user to the call verification service. Provided so (answer Yes to act 277), the CVS 100 will request a challenge from the recipient party in a further act 280. The challenge will correspond to a user defined test uniquely known to the user, thereby showing that the call is actually a verified call under the present call verification service. The challenge may be for instance a voice prompt that the user B of the recipient device may record for subsequent replay with each incoming verified call. Such a challenge will be stored in a further act 282 in relation to the recipient party in database 115, using for instance its phone number at the entry in the database. An imposter trying to copy the present verification service will not be able to access the user based challenge. The service may carry on with presenting further information about the calling party in an act 282, such as full name, website info, or any other data collected during registration of acts 210-230 in FIG. 2A.
  • Once the recipient party is no longer a first time user (answer No to act 277), the CVS 100 will retrieve in database 115 the data stored in relation to the recipient party entry in a further act 290, e.g. the challenge provided in act 280. The challenge, such as a voice prompt with the User B own voice, will be presented to the recipient device. This may alternatively be further questions, or recognition of objects initially provided by the user B. In a further act 292, the CVS will present a second notification based on the retrieved data, here the stored challenge. This corresponds to the setup message “setup 7” in FIGS. 1A and 1B. Provided the challenge is correct validated by the user B (voice prompt acknowledged, right answer to the question . . . ), the present call verification service will proceed to act 284 with providing additional information about the calling party.
  • Once the call is verified and accepted by the recipient party 102, a call, i.e. a communication path, is established between the calling party and the recipient party.
  • Thanks to the present system, a user can enjoy a call verification service allowing only certified/verified calls from calling parties such as businesses. Using a token provided at registration of a calling party, the CVS 100 will only process calls from registered parties.
  • The present system also bring enhanced trust to the callee as to whom is behind the incoming call.
  • Finally, the above-discussion is intended to be merely illustrative of the present system and should not be construed as limiting the appended claims to any particular embodiment or group of embodiments. Thus, while the present system has been described with reference to exemplary embodiments, it should also be appreciated that numerous modifications and alternative embodiments may be devised by those having ordinary skill in the art without departing from the broader and intended spirit and scope of the present system as set forth in the claims that follow.
  • The section headings included herein are intended to facilitate a review but are not intended to limit the scope of the present system. Accordingly, the specifications and drawings are to be regarded in an illustrative manner and are not intended to limit the scope of the appended claims.

Claims (12)

What is claimed is:
1. A method to verify a calling party when placing a call to a recipient party, the method comprising:
receiving at an Application Program Interface (API) platform a request from a calling party for registration for the calling party verification,
sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
setting up a call to the recipient party, when there is a match between the first and second token.
2. The method of claim 1, wherein the request for registration further comprises a first identifier for the calling party, the act of sending a first token further comprising:
storing at the API platform the first identifier in relation to the first token.
3. The method of claim 2, the act of sending a first token comprising a preliminary act of:
generating the first token based at least on the first identifier.
4. The method of claim 2, wherein the request for setting up a call further comprises the first identifier for the calling party, the act of setting up a call further comprising:
generating a Caller ID based on the first identifier,
setting up a call to the recipient party using the generated Caller ID as the Caller ID to the call.
5. The method of claim 4, the act of generating a Caller ID further comprising:
generating a Caller ID based on the result of the match between the first and second token.
6. The method of claim 2, wherein the request to set up a call further comprises a second identifier for the calling party, the act of setting up a call further comprising:
setting up a call to the recipient party, when there is a match between the first and second token and a further match between the first and second identifiers.
7. The method of claim 1, wherein the request to set up a call further comprises a second identifier for the calling party, the method further comprising:
generating a Caller ID based on the second identifier,
setting up a call to the recipient party using the generated Caller ID as the Caller ID to the call.
8. The method of claim 1, the act of setting up a call further comprising:
presenting a first notification to the recipient party, the notification comprising an indication that the call is verified.
9. The method of claim 8, further comprising:
receiving, in reply to the first notification, a request for further verification from the recipient party,
retrieving at the API platform data related to the recipient party,
presenting a second notification to the recipient party, the second notification being based on the retrieved data.
10. A call verification server to verify a calling party when placing a call to a recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
receive at the API platform a request from a calling party for registration for the calling party verification,
send to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
receive at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
set up a call to the recipient party, when there is a match between the first and second token.
11. A telecommunication system comprising:
a calling party
a recipient party
a call verification server to verify the calling party when placing a call to the recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
receive at the API platform a request from a calling party for registration for the calling party verification,
send to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
receive at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
set up a call to the recipient party, when there is a match between the first and second token.
12. An application embodied on a non-transitory computer readable medium and configured to verify a calling party when placing a call to a recipient party, the application comprising instructions for:
receiving at an Application Program Interface (API) platform a request from the calling party for registration for the calling party verification,
sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
setting up a call to the recipient party, when there is a match between the first and second token.
US15/312,337 2014-06-25 2015-06-22 A method to authenticate calls in a telecommunication system Abandoned US20170104870A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/312,337 US20170104870A1 (en) 2014-06-25 2015-06-22 A method to authenticate calls in a telecommunication system

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201462016996P 2014-06-25 2014-06-25
US15/312,337 US20170104870A1 (en) 2014-06-25 2015-06-22 A method to authenticate calls in a telecommunication system
PCT/IB2015/001181 WO2015198136A1 (en) 2014-06-25 2015-06-22 A method to authenticate calls in a telecommunication system

Publications (1)

Publication Number Publication Date
US20170104870A1 true US20170104870A1 (en) 2017-04-13

Family

ID=54266585

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/312,337 Abandoned US20170104870A1 (en) 2014-06-25 2015-06-22 A method to authenticate calls in a telecommunication system

Country Status (3)

Country Link
US (1) US20170104870A1 (en)
EP (1) EP3162104B1 (en)
WO (1) WO2015198136A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018118999A1 (en) 2016-12-20 2018-06-28 Hiya, Inc. Out-of-band call verification
US20180278746A1 (en) * 2017-03-24 2018-09-27 Vonage Business Inc. Systems and methods for providing call verification
US10992799B2 (en) 2018-12-18 2021-04-27 Wells Fargo Bank, N.A. Caller identification trust
CN113965648A (en) * 2020-07-21 2022-01-21 中国移动通信集团山东有限公司 Information hiding method and device and electronic equipment
US20220086637A1 (en) * 2020-09-11 2022-03-17 Samsung Sds Co., Ltd. Method for authentication, user terminal and authentication server for executing the same
CN114629672A (en) * 2020-12-14 2022-06-14 中国电信股份有限公司 Method, system and storage medium for improving security of voice call based on token authentication
US20220247859A1 (en) * 2020-09-25 2022-08-04 Mitel Networks (International) Limited Communication system for mitigating incoming spoofed callers using social media
US20220245747A1 (en) * 2021-01-29 2022-08-04 Techjutsu Inc. System and method for caller verification
US11595515B2 (en) * 2019-09-30 2023-02-28 Ringcentral, Inc. System and method of caller verification

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10721226B1 (en) 2017-03-10 2020-07-21 Wells Fargo Bank, N.A. User-level token for user authentication via a user device
US11763303B1 (en) 2017-03-10 2023-09-19 Wells Fargo Bank, N.A. Identity management service via a user-level token

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5901203A (en) * 1996-06-28 1999-05-04 Distributed Software Development, Inc. Computer-based system and method for identifying an unidentified caller
US20030135740A1 (en) * 2000-09-11 2003-07-17 Eli Talmor Biometric-based system and method for enabling authentication of electronic messages sent over a network
US20060021011A1 (en) * 2004-06-29 2006-01-26 International Business Machines Corporation Identity access management system
US20070201660A1 (en) * 2006-01-26 2007-08-30 International Business Machines Corporation Method and apparatus for blocking voice call spam
US20080137828A1 (en) * 2006-12-12 2008-06-12 Mazen Chmaytelli Systems and methods for caller identification customization and remote management of communication devices
US20080181379A1 (en) * 2007-01-30 2008-07-31 Alcatel Lucent Caller name authentication to prevent caller identity spoofing
US20100319063A1 (en) * 2009-06-12 2010-12-16 Microsoft Corporation Access control to secured application features using client trust levels
US8238532B1 (en) * 2009-05-19 2012-08-07 TrustID, Inc. Method of and system for discovering and reporting trustworthiness and credibility of calling party number information
US20140341366A1 (en) * 2013-05-15 2014-11-20 Verizon Patent And Licensing Inc. Call control for web calls
US20150044997A1 (en) * 2013-08-08 2015-02-12 Vonage Network Llc Method and apparatus for verifying the authenticity of mobile device information
US20150050914A1 (en) * 2013-08-13 2015-02-19 Vonage Network Llc Method and apparatus for verifying a device during provisioning through caller id
US9060057B1 (en) * 2013-03-07 2015-06-16 Serdar Artun Danis Systems and methods for caller ID authentication, spoof detection and list based call handling
US9277049B1 (en) * 2013-03-07 2016-03-01 Serdar Artun Danis Systems and methods for caller ID and call destination authentication

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7921299B1 (en) * 2003-12-05 2011-04-05 Microsoft Corporation Partner sandboxing in a shared multi-tenant billing system
EP1902564A2 (en) * 2005-07-12 2008-03-26 France Telecom Mechanism for protecting h.323 networks for call set-up functions
KR101281882B1 (en) 2009-10-12 2013-07-03 한국전자통신연구원 Caller certification method and system for phishing prevention

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5901203A (en) * 1996-06-28 1999-05-04 Distributed Software Development, Inc. Computer-based system and method for identifying an unidentified caller
US20030135740A1 (en) * 2000-09-11 2003-07-17 Eli Talmor Biometric-based system and method for enabling authentication of electronic messages sent over a network
US20060021011A1 (en) * 2004-06-29 2006-01-26 International Business Machines Corporation Identity access management system
US20070201660A1 (en) * 2006-01-26 2007-08-30 International Business Machines Corporation Method and apparatus for blocking voice call spam
US20080137828A1 (en) * 2006-12-12 2008-06-12 Mazen Chmaytelli Systems and methods for caller identification customization and remote management of communication devices
US20080181379A1 (en) * 2007-01-30 2008-07-31 Alcatel Lucent Caller name authentication to prevent caller identity spoofing
US8238532B1 (en) * 2009-05-19 2012-08-07 TrustID, Inc. Method of and system for discovering and reporting trustworthiness and credibility of calling party number information
US20100319063A1 (en) * 2009-06-12 2010-12-16 Microsoft Corporation Access control to secured application features using client trust levels
US9060057B1 (en) * 2013-03-07 2015-06-16 Serdar Artun Danis Systems and methods for caller ID authentication, spoof detection and list based call handling
US9277049B1 (en) * 2013-03-07 2016-03-01 Serdar Artun Danis Systems and methods for caller ID and call destination authentication
US20140341366A1 (en) * 2013-05-15 2014-11-20 Verizon Patent And Licensing Inc. Call control for web calls
US20150044997A1 (en) * 2013-08-08 2015-02-12 Vonage Network Llc Method and apparatus for verifying the authenticity of mobile device information
US20150050914A1 (en) * 2013-08-13 2015-02-19 Vonage Network Llc Method and apparatus for verifying a device during provisioning through caller id

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3566427A4 (en) * 2016-12-20 2019-12-11 Hiya, Inc. Out-of-band call verification
WO2018118999A1 (en) 2016-12-20 2018-06-28 Hiya, Inc. Out-of-band call verification
US20180278746A1 (en) * 2017-03-24 2018-09-27 Vonage Business Inc. Systems and methods for providing call verification
US10110740B2 (en) * 2017-03-24 2018-10-23 Vonage Business Inc. Systems and methods for providing call verification
US11218590B2 (en) * 2017-03-24 2022-01-04 Vonage Business, Inc. Systems and methods for providing call verification
US11509765B1 (en) 2018-12-18 2022-11-22 Wells Fargo Bank, N.A. Caller identification trust
US10992799B2 (en) 2018-12-18 2021-04-27 Wells Fargo Bank, N.A. Caller identification trust
US11902464B1 (en) 2018-12-18 2024-02-13 Wells Fargo Bank, N.A. Caller identification trust
US11595515B2 (en) * 2019-09-30 2023-02-28 Ringcentral, Inc. System and method of caller verification
CN113965648A (en) * 2020-07-21 2022-01-21 中国移动通信集团山东有限公司 Information hiding method and device and electronic equipment
US20220086637A1 (en) * 2020-09-11 2022-03-17 Samsung Sds Co., Ltd. Method for authentication, user terminal and authentication server for executing the same
US11683686B2 (en) * 2020-09-11 2023-06-20 Samsung Sds Co., Ltd. Method for authentication, user terminal and authentication server for executing the same
US20220247859A1 (en) * 2020-09-25 2022-08-04 Mitel Networks (International) Limited Communication system for mitigating incoming spoofed callers using social media
US11917098B2 (en) * 2020-09-25 2024-02-27 Mitel Networks Corporation Communication system for mitigating incoming spoofed callers using social media
CN114629672A (en) * 2020-12-14 2022-06-14 中国电信股份有限公司 Method, system and storage medium for improving security of voice call based on token authentication
US20220245747A1 (en) * 2021-01-29 2022-08-04 Techjutsu Inc. System and method for caller verification

Also Published As

Publication number Publication date
EP3162104A1 (en) 2017-05-03
EP3162104B1 (en) 2022-11-02
WO2015198136A1 (en) 2015-12-30

Similar Documents

Publication Publication Date Title
EP3162104B1 (en) A method to authenticate calls in a telecommunication system
US10244105B2 (en) Methods and systems for real time display of caller location, profile, and trust relationship
US9781255B1 (en) Authentication of phone call origination
US8879540B1 (en) Systems, methods, devices and arrangements for emergency call services
US20090025075A1 (en) On-demand authentication of call session party information during a telephone call
US10893138B2 (en) Caller identity and authentication service
US11570296B2 (en) End-to-end management of authenticated communications
US9860228B2 (en) Pre-delivery authentication
US8965342B1 (en) Method and apparatus for verifying the authenticity of mobile device information
US11671468B2 (en) Authenticated calling voicemail integration
US20200220837A1 (en) System and method to use a mobile number in conjunction with a non-telephony internet connected device
JP2013534757A (en) Method and system for routing communications
US10244107B1 (en) Systems and methods for causing display of a reputation indicator associated with a called party
RU2689441C1 (en) System and method of monitoring communication, and/or detecting scammers, and/or authenticating statements/allegations of belonging to any organization
US10778732B2 (en) Method of detecting a spoofing of identity belonging to a domain
CN108235310A (en) Method, server and the system of identification camouflage telephone number
FR3096207A1 (en) Method for determining a spoofing of at least one identifier
CN111224918A (en) Real-time networking security control platform and access authentication method
KR20150031503A (en) The Method of Confirmation about Valid Caller ID Using Group Information

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION